An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xcmc3LWhmeDctOTVjNc4AAxJC
Command injection in Git package in Wrangler
A command injection vulnerability was discovered in Wrangler's Git package affecting versions up to and including
Wrangler's Git package uses the underlying Git binary present in the host OS or container image to execute Git operations. Specially crafted commands can be passed to Wrangler that will change their behavior and cause confusion when executed through Git, resulting in command injection in the underlying host.
A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.
Patched versions include
v1.0.1 and later and the backported tags -
For more information
If you have any questions or comments about this advisory:
- Reach out to SUSE Rancher Security team for security related inquiries.
- Open an issue in Rancher or Wrangler repository.
- Verify our support matrix and product support lifecycle.
Source: GitHub Advisory Database
Published: 4 months ago
Updated: about 1 month ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-qrg7-hfx7-95c5, CVE-2022-31249
go:github.com/rancher/wranglerVersions: = 1.0.0, >= 0.8.6, < 0.8.11, >= 0.8.0, <= 0.8.4, <= 0.7.3
Fixed in: 1.0.1, 0.8.11, 0.8.5-security1, 0.7.4-security1